Advanced Services powered by Hawaiian Telcom


Managed Endpoint Detection & Response (EDR)

Strengthen your company's protection against cyber threats.

Hawaiian Telcom’s Endpoint detection and response (EDR) service will improve the security of your organization’s computers against cyber threats. Utilizing best-in-class endpoint solutions, our fully managed service is installed, maintained, and managed by experienced security engineers, allowing you to focus on your business.

Managed Endpoint Protection

Our suite of managed security services are designed to help you secure your business data and achieve regulatory compliance.

Fully Managed

Our team of security engineers install and manage the Secure Endpoint software to your workstations, laptops, and servers. We ensure the software is regularly updated and working properly and alert you when threats are detected.

Advanced Malware Protection

Secure Endpoint includes constantly updated, definition-based antivirus engines for both Windows and Mac or Linux endpoints and allow administrator robust control capabilities and ability to enforce blacklists. The antivirus database resides locally on each computer or device, meaning it does not rely on cloud connectivity to operate. This ensures that your endpoints are protected both on- and offline.

Exploit prevention

Memory attacks can penetrate endpoints, and malware evades security defenses by exploiting vulnerabilities in applications and operating system processes. The exploit prevention feature will defend endpoints from exploit-based, memory injection attacks.

Malicious activity protection

Secure Endpoint continually monitors activity from your computers and devices. It provides run-time detection and blocking of abnormal activity to stop the attack from happening.

Reporting dashboards/p>

Actionable dashboards enable streamlined management and faster response time on incidents. Events and endpoints are categorized by priority and tied into workflows so you can track progress during an investigation.

Managed Endpoint Protection

Our suite of managed security services are designed to help you secure your business data and achieve regulatory compliance.

Fully Managed

Our team of security engineers install and manage the Secure Endpoint software to your workstations, laptops, and servers. We ensure the software is regularly updated and working properly and alert you when threats are detected.

Advanced Malware Protection

Secure Endpoint includes constantly updated, definition-based antivirus engines for both Windows and Mac or Linux endpoints and allow administrator robust control capabilities and ability to enforce blacklists. The antivirus database resides locally on each computer or device, meaning it does not rely on cloud connectivity to operate. This ensures that your endpoints are protected both on- and offline.

Exploit prevention

Memory attacks can penetrate endpoints, and malware evades security defenses by exploiting vulnerabilities in applications and operating system processes. The exploit prevention feature will defend endpoints from exploit-based, memory injection attacks.

Malicious activity protection

Secure Endpoint continually monitors activity from your computers and devices. It provides run-time detection and blocking of abnormal activity to stop the attack from happening.

Reporting Dashboards

Actionable dashboards enable streamlined management and faster response time on incidents. Events and endpoints are categorized by priority and tied into workflows so you can track progress during an investigation.

Benefits

  • Investment protection and optimization
  • Customizable service to fit your unique needs
  • Work conducted by skilled and certified technicians
  • Experienced and knowledgeable best practice
  • Full-time staffed Network Operations Center

Features

  • Customized, independent security assessments and audits
  • Detailed report of findings and gap analysis
  • Suggested remediation plans
  • Evaluation of or development of security policies
  • Post-security-event analysis

End Point Protection Product Sheet

Want to know more? Download the data sheet for full product details.

Connect with the experts

at hawaiian telcom

Get Connected Or learn more about Advanced Services